default search action
11th SCN 2018: Amalfi, Italy
- Dario Catalano, Roberto De Prisco:
Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings. Lecture Notes in Computer Science 11035, Springer 2018, ISBN 978-3-319-98112-3
Signatures and Watermarking
- Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi:
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages. 3-22 - Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Fully Anonymous Group Signature with Verifier-Local Revocation. 23-42 - Dario Fiore, Elena Pagnin:
Matrioska: A Compiler for Multi-key Homomorphic Signatures. 43-62 - Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Unforgeable Watermarking Schemes with Public Extraction. 63-80
Composability
- Daniel Jost, Ueli Maurer:
Security Definitions for Hash Functions: Combining UCE and Indifferentiability. 83-101 - Christian Badertscher, Fabio Banfi, Ueli Maurer:
A Constructive Perspective on Signcryption Security. 102-120
Encryption I
- Romain Gay, Lucas Kowalczyk, Hoeteck Wee:
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys. 123-139 - Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions. 140-159 - Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song:
Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR. 160-177
Multiparty Computation
- Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood:
Reducing Communication Channels in MPC. 181-199 - Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, Moti Yung:
Proactive Secure Multiparty Computation with a Dishonest Majority. 200-215 - Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem:
From Fairness to Full Security in Multiparty Computation. 216-234 - Roi Inbar, Eran Omri, Benny Pinkas:
Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters. 235-252
Anonymity and Zero Knowledge
- Adam L. Young, Moti Yung:
Semantically Secure Anonymity: Foundations of Re-encryption. 255-273 - Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev:
Securing Abe's Mix-Net Against Malicious Verifiers via Witness Indistinguishability. 274-291 - Ben Berger, Zvika Brakerski:
Zero-Knowledge Protocols for Search Problems. 292-309
Secret Sharing and Oblivious Transfer
- Amos Beimel, Hussien Othman:
Evolving Ramp Secret-Sharing Schemes. 313-332 - Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen:
Actively Secure OT-Extension from q-ary Linear Codes. 333-348
Lattices and Post Quantum Cryptography
- Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer:
Estimate All the {LWE, NTRU} Schemes! 351-367 - Carsten Baum, Ivan Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert:
More Efficient Commitments from Structured Lattice Assumptions. 368-385 - Akinori Hosoyamada, Yu Sasaki:
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions. 386-403
Obfuscation
- Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova:
Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation. 407-424 - Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue, Daniel Wichs:
Non-trivial Witness Encryption and Null-iO from Standard Assumptions. 425-441
Two-Party Computation
- Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas:
Secure Two-Party Computation over Unreliable Channels. 445-463 - Michele Ciampi, Claudio Orlandi:
Combining Private Set-Intersection with Secure Two-Party Computation. 464-482
Protocols
- Jung Yeon Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, Jiayu Xu:
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange. 485-504 - Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias:
On the Security Properties of e-Voting Bulletin Boards. 505-523
Encryption II
- Marc Joye, Alain Passelègue:
Function-Revealing Encryption - Definitions and Constructions. 527-543 - Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu:
Function-Hiding Inner Product Encryption Is Practical. 544-562 - Junqing Gong, Benoît Libert, Somindu C. Ramanna:
Compact IBBE and Fuzzy IBE from Simple Assumptions. 563-582
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.